Hilfe Warenkorb Konto Anmelden
 
 
   Schnellsuche   
     zur Expertensuche                      
Advances in Digital Forensics
  Großes Bild
 
Advances in Digital Forensics
von: Mark Pollitt, Sujeet Shenoi
Springer-Verlag, 2006
ISBN: 9780387311630
333 Seiten, Download: 37823 KB
 
Format:  PDF
geeignet für: Apple iPad, Android Tablet PC's Online-Lesen PC, MAC, Laptop

Typ: B (paralleler Zugriff)

 

 
eBook anfordern
Inhaltsverzeichnis

  Contents 7  
  Contributing Authors 11  
  Preface 19  
  I THEMES AND ISSUES 22  
     Chapter 1 DEALING WITH TERABYTE DATA SETS IN DIGITAL INVESTIGATIONS 23  
     Chapter 2 FORENSICS AND PRIVACY-ENHANCING TECHNOLOGIES 37  
     Chapter 3 A NETWORK- BASED ARCHITECTURE FOR STORING DIGITAL EVIDENCE 53  
     Chapter 4 DIGITAL FORENSICS: MEETING THE CHALLENGES OF SCIENTIFIC EVIDENCE 63  
  II INVESTIGATIVE TECHNIQUES 85  
     Chapter 6 DETECTING SOCIAL ENGINEERING 87  
     Chapter 7 A FRAMEWORK FOR EMAIL INVESTIGATIONS 99  
     Chapter 8 THE MITNICK CASE: HOW BAYES COULD HAVE HELPED 111  
     Chapter 9 APPLYING FORENSIC PRINCIPLES TO COMPUTER-BASED ASSESSMENT 125  
     Chapter 10 EXPLORING FORENSIC DATA WITH SELF-ORGANIZING MAPS 133  
  III NETWORK FORENSICS 145  
     Chapter 11 INTEGRATING DIGITAL FORENSICS IN NETWORK INFRASTRUCTURES 147  
     Chapter 12 USING PEER-TO-PEER TECHNOLOGY FOR NETWORK FORENSICS 161  
     Chapter 13 FORENSIC PROFILING SYSTEM 173  
     Chapter 14 GLOBAL INTERNET ROUTING FORENSICS 185  
     Chapter 15 USING SIGNALING INFORMATION IN TELECOM NETWORK FORENSICS 197  
  IV PORTABLE ELECTRONIC DEVICE FORENSICS 210  
     Chapter 16 FORENSIC ANALYSIS OF MOBILE PHONE INTERNAL MEMORY 211  
     Chapter 17 IMAGING AND ANALYSIS OF GSM SIM CARDS 225  
     Chapter 18 EXTRACTING CONCEALED DATA FROM BIOS CHIPS 237  
  V LINUX AND FILE SYSTEM FORENSICS 252  
     Chapter 19 RECOVERING DIGITAL EVIDENCE FROM LINUX SYSTEMS 253  
     Chapter 20 DETECTING HIDDEN DATA IN EXT2/EXT3 FILE SYSTEMS 265  
  VI APPLICATIONS AND TECHNIQUES 278  
     Chapter 21 FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING 279  
     Chapter 22 CONTENT- BASED IMAGE RETRIEVAL FOR DIGITAL FORENSICS 291  
     Chapter 23 MAKING DECISIONS ABOUT LEGAL RESPONSES TO CYBER ATTACKS 303  
     Chapter 24 APPLYING FILTER CLUSTERS TO REDUCE SEARCH STATE SPACE 315  
     Chapter 25 IN- KERNEL CRYPTOGRAPHIC EXECUTABLE VERIFICATION 323  
  More eBook at www.ciando.com 0  


nach oben


  Mehr zum Inhalt
Kapitelübersicht
Kurzinformation
Inhaltsverzeichnis
Leseprobe
Blick ins Buch
Fragen zu eBooks?

  Medientyp
  eBooks
  eJournal
  alle

  Navigation
Belletristik / Romane
Computer
Geschichte
Kultur
Medizin / Gesundheit
Philosophie / Religion
Politik
Psychologie / Pädagogik
Ratgeber
Recht
Reise / Hobbys
Sexualität / Erotik
Technik / Wissen
Wirtschaft

  Info
Hier gelangen Sie wieder zum Online-Auftritt Ihrer Bibliothek
© 2008-2024 ciando GmbH | Impressum | Kontakt | F.A.Q. | Datenschutz